Nov 2, 2021
84 Views
0 0

Ransomware Evolves: Affiliates Set to Wield Greater Power

Written by

3rd Party Risk Management , Business Continuity Management / Disaster Recovery , Critical Infrastructure Security
How is the ransomware ecosystem set to evolve?
See Also: Live Panel | Securing Healthcare’s Digital Transformation: Provider and Vendor Perspectives
Since ransomware-wielding attackers overreached – in particular after DarkSide hit Colonial Pipeline this past summer – the administrators of those groups have been banned from leading cybercrime forums, says John Fokker, the principal engineer and head of cyber investigations for Advanced Threat Research at McAfee Enterprise. And that change has affected ransomware operators’ ability to recruit affiliates via forums and to use their malware against victims in exchange for a cut of every ransom a victim paid.
As a result, “what we’re seeing, and what we think is going to happen, is that there is going to be a power balance shift,” Fokker says. As detailed in a new ​report he co-authored, McAfee Enterprise predicts that experienced affiliates will more often be calling the shots and selling access to a victim to the highest ransomware operation bidder. Unfortunately, he adds, this more decentralized approach may also make it much more difficult to track ransomware operations, not least for law enforcement agencies.
In a video interview with Information Security Media Group, Fokker discusses:
Fokker is the principal engineer and head of cyber investigations for Advanced Threat Research at McAfee Enterprise. He was previously the project leader for the cybercrime threat intelligence team for the Dutch Police.
Executive Editor, DataBreachToday & Europe, ISMG
Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.

Covering topics in risk management, compliance, fraud, and information security.
By submitting this form you agree to our Privacy & GDPR Statement





Application Security
Account Takeover Fraud
3rd Party Risk Management
Business Continuity Management / Disaster Recovery
Business Continuity Management / Disaster Recovery
Data Science Institute, Columbia University – New York, NY
Continue »
90 minutes · Premium OnDemand 
Overview
From heightened risks to increased regulations, senior leaders at all levels are pressured to improve their organizations’ risk management capabilities. But no one is showing them how – until now.
Learn the fundamentals of developing a risk management program from the man who wrote the book on the topic: Ron Ross, computer scientist for the National Institute of Standards and Technology. In an exclusive presentation, Ross, lead author of NIST Special Publication 800-37 – the bible of risk assessment and management – will share his unique insights on how to:
Sr. Computer Scientist & Information Security Researcher, National Institute of Standards and Technology (NIST)
Was added to your briefcase
Ransomware Evolves: Affiliates Set to Wield Greater Power
Ransomware Evolves: Affiliates Set to Wield Greater Power
Sign in now
Need help registering?
Contact support
Complete your profile and stay up to date
Contact Support
Create an ISMG account now
Create an ISMG account now
Need help registering?
Contact support
Sign in now
Need help registering?
Contact support
Sign in now
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.

source

Article Categories:
Database Breaches

Leave a Reply